The title that this application claims application on December 1st, 2011 is the priority of No. the 61/565th, 864, the U.S. Provisional Patent Application of " CellularBasebandProcessing ".The title that the application also requires on December 9th, 2011 to apply for is No. the 61/568th, 868, the U.S. Provisional Patent Application of " CellularBasebandProcessing " and the U.S. Patent application the 13/645th of application on October 5th, 2012, the priority of No. 723.The full content of these applications is attached to herein by reference.
Summary of the invention
An aspect of the present disclosure relates to a kind of method, it comprises: Wireless Telecom Equipment receives and catches instruction (AI) data on a downlink channel, and described AI data comprise catches instruction (AI), corresponding AI signature and corresponding multiple extended acquisition instruction (EAI); Determine that whether the channel power corresponding to received AI signature is more than the first negative pole limit by described Wireless Telecom Equipment; Determine that whether degree of reiability that described extended acquisition indicates is more than second limit by described Wireless Telecom Equipment; If described channel power is no more than described first negative pole limit and described degree of reiability is no more than described second limit, then state that described AI has nondeterministic statement by described Wireless Telecom Equipment, wherein this uncertain AI state representation neither confirms the access request also not refusing to be associated with received AI data.
In the method, preferably also comprise: the transmitted power being reduced access request subsequently by described Wireless Telecom Equipment in response to described uncertain AI state.
In the method, preferably also comprise: if described channel power is no more than described first negative pole limit, then calculates acquiescence and strengthen dedicated channel (E-DCH) resource index.
In the method, the value of preferred described uncertain AI state is zero.
In the method, preferably also comprise: if described channel power be no more than described first negative pole limit and described degree of reiability is no more than described second limit, then state that described AI state is Negative Acknowledgement.
In the method, preferably also comprise: if an extended acquisition instruction with the highest absolute value is positive, then state that the state of described extended acquisition instruction (EAI) is Negative Acknowledgement.
In the method, preferably also comprise: if an extended acquisition instruction with the highest absolute value is negative, then state that the state of described extended acquisition instruction (EAI) is positive acknowledgement.
In the method, preferably also comprise: calculate and strengthen dedicated channel (E-DCH) resource index.
In the method, preferably also comprise: at least part of sum based on acquiescence E-DCH resource index, E-DCH resource and random access guiding signature calculate and strengthen dedicated channel (E-DCH) resource index.
In the method, another the ratio during the degree of reiability that preferred described extended acquisition indicates indicates with described multiple extended acquisition based in described multiple extended acquisition instruction at least partly.
In the method, select based on absolute value with described another for described one of the described multiple extended acquisition instructions used in preferred described ratio.
In the method, described one in preferred described multiple extended acquisition instruction has the second maximum value, and described another in described multiple extended acquisition instruction has maximum value.
In the method, preferably receive described AI data at AICH Acquisition Indication Channel (AICH).
In the method, preferably receive described AI data in response to the random access request sent on the uplink channel by described Wireless Telecom Equipment.
Another aspect of the present disclosure relates to a kind of equipment, and it comprises: wireless transceiver; Power control circuit, is configured to control the power to described wireless transceiver; And treatment circuit, be configured to: receive via described wireless transceiver and catch instruction (AI) data, described AI data comprise catches instruction (AI), corresponding AI signature and corresponding multiple extended acquisition instruction (EAI); Determine that whether the channel power corresponding to received AI signature is more than the first negative pole limit; Determine that whether degree of reiability that described extended acquisition indicates is more than second limit; If with described channel power be no more than described first negative pole limit and described degree of reiability is no more than described second limit, then provide power ramping to input to described power control circuit; Wherein, described power control circuit is increased to the transmitting power of described wireless transceiver in response to described power ramping input.
The preferred described treatment circuit of this equipment is also configured at least partly calculate described degree of reiability based on one that selects from described multiple extended acquisition instruction and ratio between another, and wherein said selection is based on absolute value.
The preferred described treatment circuit of this equipment is also configured to: calculate the first positive limit based on multiple channel power sum, and each channel power corresponds to one in multiple received AI signature; With the negative value of the described first negative pole limit of calculating as the described first positive limit.
The preferred described treatment circuit of this equipment is also configured to: determine the described first positive limit in proportion by power offset parameter.
Of the present disclosurely relate in one aspect to a kind of method again, it comprises: the base station the first random access request being sent to cellular radio Communication system; Receive at the subscriber unit (UE) of described cellular radio Communication system and catch instruction (AI) data, described in catch designation data comprise catch instruction (AI), corresponding AI signs and corresponding multiple expansion AI instruction (EAI); Determine that whether the channel power corresponding to received AI signature is more than the first negative pole limit by described UE; Determine that whether degree of reiability that described extended acquisition indicates is more than second limit by described UE; If described channel power is no more than described first negative pole limit and described degree of reiability is no more than described second limit, then launch second random access request relative to described first random access request with the power of increase.
In the method, preferably also comprise and at least partly calculate described degree of reiability based on one that selects from described multiple extended acquisition instruction and ratio between another, wherein said selection is based on absolute value.
Embodiment
Fig. 1 shows the system diagram of a part of cellular radio Communication system 100 of the support of wireless communication equipment operating according to some execution mode of the present invention.In some embodiments, cellular radio Communication system 100 support is called as the 3G (Third Generation) Moblie partnership projects (3GPP) of general land wireless access (UTRA), and it utilizes Wideband Code Division Multiple Access (WCDMA) (W-CDMA) wireless access technology.
Cellular radio Communication system 100 comprises mobile switching centre (MSC) 105, Serving GPRS Support Node (SGSN) 110, radio network controller (RNC) 115 and base station 120.SGSN110 is coupled to the Internet 125 via Gateway GPRS Support Node (GGSN) 130.Traditional audio terminal 135 couples PSTN (PSTN) 140.Internet voice protocol (VoIP) terminal 145 and personal computer 150 are coupled to the Internet 125.MSC105 couples PSTN140.
The community that each base station in base station 120 is support of wireless communication or one group of sector provide service.The wireless link not only having comprised forward link assembly but also comprised reverse link assembly is supported in base station 120 and it provides between the wireless terminal of service and carries out radio communication.These wireless links support digital data communications, VoIP communication and other Digital multimedia communications.Cellular radio Communication system 100 also back compatible can support simulated operation.
Cellular radio Communication system 100 also comprises Wireless Telecom Equipment 155, and this Wireless Telecom Equipment 155 couples cellular radio Communication system 100 via the wireless link with base station 120.Therefore, Wireless Telecom Equipment 155 is coupled to radio network controller 115 by base station 120, and radio network controller 115 is coupled to again core network 160.
As what describe in different 3GPP standards, cordless communication network equipment 155 operates as the role of subscriber unit (userelement) (UE), and therefore, Wireless Telecom Equipment 155 can be called as UE in this article.Be appreciated that Wireless Telecom Equipment 155 can adopt multi-form, such as mobile phone, panel computer, portable computer, laptop computer and desktop computer.Cellular radio Communication system 100 also supports the communication with the wireless terminal of other types.
As everyone knows, Wireless Telecom Equipment 155 can carry out online " surfing ", the data communication sending and receive such as Email, transmission and reception file and perform other data manipulations.In order to support internet access and other data, services, the different execution modes of Wireless Telecom Equipment 155 implement 3GPP high-speed packet access (HSPA) standard.HSPDA comprises High Speed Uplink Packet access (HSUPA) and high-speed downlink packet access (HSDPA), which defines channel and process (procedure) that many groups make it possible to carry out in up link and down link respectively high-speed packet data transmission.
Be derived from Wireless Telecom Equipment 155(and subscriber unit or UE) or transmit on transport channels from the packets of information (packet) that Wireless Telecom Equipment 155 is specified.These packets of information can carry voice, video or data.Transmission channel is mapped to the physical channel of physical layer.Physical channel can use the different channel code of orthogonal in code domain (orthogonal).The instruction (AI) of catching that the execution mode of Wireless Telecom Equipment 155 comprises for accessing in conjunction with high-speed packet detects logical one 65.The operation of AI detection logical one 65 will be described in further detail below, but first will provide the Brief Discussion of the channel usage of Wireless Telecom Equipment 155.
Fig. 2 shows the figure of transmission according to the Wireless Telecom Equipment 155 of some execution mode disclosed herein and physical channel usage.Wireless Telecom Equipment 155 can work under different mode and state.Under certain conditions, such as, CELL_FACH state, does not have DPCH to distribute to Wireless Telecom Equipment 155, on the contrary, gives tacit consent to public or shared transmission channel for ul transmissions.Common transport channel is called as enhancing dedicated channel (E-DCH) 205.As shown in Figure 2, utilizing before E-DCH205 transmits data in user plane, Wireless Telecom Equipment 155 carrys out request access E-DCH205 by first sending access lead (accesspreamble) 210 in uplink physical channel to base station 120, and wherein uplink physical channel is called as Physical Random Access Channel (PRACH) 215.Responsively, base station 120 sends instruction that whether this request be authorized to and about the configuration information of resource being distributed to Wireless Telecom Equipment 155 by base station 120 on the physical down link channel being called as AICH Acquisition Indication Channel (AICH) 220.These resources can comprise, such as, and power, time slot and code resource.Can from the common pool allocation of codes resource of code being assigned to E-DCH205.Then, Wireless Telecom Equipment 155 uses the resource of distributing to avoid conflict, and sends user data on E-DCH205 simultaneously.
More specifically, Wireless Telecom Equipment 255 carrys out request access E-DCH205 by sending access lead 210 at the access slot (accessslot) of the Stochastic choice of PRACH215.Base station 120 is replied with catching instruction (AI) at the corresponding access slot of AICH220.Base station 120 also sends the information for distributed transfer resource of encoding at the corresponding access slot of expansion AICH (E-AICH) 225.In some embodiments, this coded message comprises the index of predefine resource table.
AI detect logical one 65 process receive on AICH220 catch designation data, thus classification access request result.To describe in further detail below, AI detects logical one 65 and states that (declare) access request is represented the nondeterministic statement of neither positive acknowledgement also not Negative Acknowledgement by positive acknowledgement, Negative Acknowledgement or be in.If AI detects logical one 65 and states positive acknowledgement state, the miscellaneous part so in Wireless Telecom Equipment 155 can use the transfer resource of distribution to send user data on E-DCH205.Especially, if AI detects logical one 65 state positive acknowledgement state, the reflector power level so in Wireless Telecom Equipment 155 sends user data, and this power level is according to calculating for the level sending a upper access lead 210.
On the other hand, if AI detects logical one 65 state Negative Acknowledgement state, so the physical layer of Wireless Telecom Equipment 155 stops transmission and control is given back medium access control (MAC) layer.Wireless Telecom Equipment 155 finally regains access according to MAC program, and MAC program is by the 3GPP standard definition based on continuation probability.
If AI detects logical one 65 state nondeterministic statement, so to suppose that base station 120 does not receive leading for Wireless Telecom Equipment 155, and use open Loop Power control to send another access lead 210.
Should be appreciated that detection scheme has the probability P of certain error detection AI
fEAI.This error detection can cause distributed transfer resource of decoding improperly.(more specifically, the error detection of EAI causes the E-DCH resource configuration index of decoding error).The mistake utilizing incorrect transfer resource to cause again on the receiver when sending user data.Therefore, expect to reduce P
fEAI.
Compared with conventional art, utilize technology disclosed herein, AI detects logical one 65 and reduces P
fEAI.Traditional AI detection technique compares channel power and the threshold value of AI signature, and wherein this threshold value represents the total channel power of received AI signature.The execution mode that AI disclosed herein detects logical one 65 uses extra threshold value to compare, and this compares the degree of reiability (reliabilitymetric) relating to expansion AI.Depend on the result additionally compared, AI detects logical one 65 and states Negative Acknowledgement state or uncertain (non-declarative) state.Nondeterministic statement means that AI detects logical one 65 and can not to decode EAI.As mentioned above, by adjusting the power level of next access lead 210, the reflector in Wireless Telecom Equipment 155 is reacted to nondeterministic statement.
Wireless Telecom Equipment 155 comprises control logic, power control circuit, symbol decoder, transceiver and AI and detects logical one 65.As mentioned above, Wireless Telecom Equipment 155 receives the response to access request on AICH Acquisition Indication Channel (AICH) 220.The symbol decoding that AICH220 carries is become data by symbol decoder, and provides the data value of decoding to control logic.Symbol decoder is also for control logic provides the one or more parameters be associated with decoded data value.These parameters can comprise, such as, and the channel power of particular solution code value and the degree of reiability of particular solution code value.
Control logic provides the AICH data of decoding and described tolerance to detect logical one 65 to AI.AI detects the deployment (disposition) that logical one 65 the AICH data using decoding and the parameter be associated determine access request.Especially, AI detects logical one 65 operation parameter determination access request by positive acknowledgement, Negative Acknowledgement, be still in and represent neither confirm the nondeterministic statement also do not refused.AI detects logical one 65 and states that access request is in a state in these three states, and this comformed information is supplied to control logic.In some embodiments, determine two states, one for catching instruction (AI), one for extended acquisition instruction, wherein these two states are separate.
Control logic uses the state of access request to control the power of transceiver.More specifically, if determine that access request is nondeterministic statement (represents and neither confirm also not refuse), so control logic indicated horsepower control circuit is reduced to the power of transceiver.This can pass through such as to realize with under type: make control logic respond AI detection logical one 65 and nondeterministic statement detected and provide power ramping to input (powerrampinput) to power control circuit, wherein power ramping input causes increasing to the power of transceiver.
Fig. 3 shows and detects logical one 65(Fig. 1 according to the AI of some execution mode disclosed herein) the flow chart of operation.Or the flow chart of Fig. 3 can be considered as realizing the different step that AI detects the method that logical one 65 performs.The process of Fig. 3 can by AICH Acquisition Indication Channel (AICH) 220(Fig. 2) on receive data-triggered, this is again in response to Wireless Telecom Equipment 155(Fig. 1) produce to base station 120(Fig. 1) access request.
Start at square frame 305, AI detects logical one 65 and obtains the decoded data that AICH220 carries and the different parameters be associated with decoded data.As mentioned above, these data and parameter can directly be provided by symbol decoder or provide via control logic.Comprise in the AICH data of square frame 305 acquisition and catch instruction (AI), corresponding AI signature and one group of extended acquisition instruction (EAI).
In block 310, AI detects logical one 65 and checks the AI obtained at square frame 305, and determines that the AI corresponding to this AI signs.Then, AI detects channel power (also obtaining at square frame 305) and the first predefine limit that logical one 65 compares this AI signature.This first predefine limit represents the total channel power of received AI signature.In some embodiments, this gross power calculates the channel power summation of signing as the AI of all receptions.Power bias (poweroffset) can be passed through and determine (scale) this summation in proportion.In some embodiments, the first predefine limit used in block 310 corresponds to the T2 parameter described in 3GPP physical layer specification.
If determine that the channel power of received AI signature is no more than the negative value of the first predefine limit (such as in block 310, ﹣ T2), so AI detects logical one 65 and advances to square frame 315, will further compare the reliability considering EAI data in square frame 315 before the deployment determining access request.But if determine that the channel power of received AI signature is more than the first predefine limit (such as, T2) in block 310, so AI detects the deployment that logical one 65 determines access request, and does not consider EAI reliability.For this reason, AI detects logical one 65 and advances to square frame 320, wherein calculate acquiescence E-AICH resource index according to the information received on AICH220, then advance to square frame 325, wherein AI detects logical one 65 by statement AI is the deployment that access request is determined in positive acknowledgement (PositiveAcknowledgement).In some embodiments, the statement of positive acknowledgement equals numerical value+1.Make AI have statement value, the process of Fig. 3 terminates.
As mentioned above, if the channel power of the AI signature received is less than or equal to ﹣ T2, so AI detects logical one 65 and performs additionally comparing of the reliability considering the EAI data received.For this reason, detect logical one 65 calculate EAI confidence value at square frame 315, AI, this EAI confidence value is used in the ratio between the selected extended acquisition instruction of the extended acquisition instruction that square frame 305 obtains.In some embodiments, select the expansion AI with the highest absolute value and the second high absolute value, the ratio calculated at square frame 315 is like this abs(EAI_ the second height/EAI_max).Then, confidence value may be calculated and deducts this ratio (such as, 1.0 ﹣ ratios) from 1.0.
In square frame 330, AI detects logical one 65 and compares the EAI confidence value and another predefine limit (referred to herein as T3) that calculate at square frame 315.Rule of thumb can determine that this predefine limit T3 detects (falsepositivedetection) rate (P with the false positive realizing expecting to EAI
fEAI).Such as, different T3 values is utilized can to draw (plot) E
c-AICHwith I
orratio (with db), produce false positive and power use between the T3 accepting to trade off can be selected as the threshold confidence value of square frame 330.
If determine that the confidence ratio (calculating at square frame 315) of received EAI is less than T3 threshold value at square frame 330, so determine that the deployment of access request does not need to relate to comparing further of EAI data reliability.Therefore, process and proceed at square frame 335, wherein AI detects logical one 65 by statement AI is the uncertain deployment determining access request.In some embodiments, uncertain statement equals numerical value 0.Make AI have the value of statement, the process of Fig. 3 terminates.
If determine that the confidence ratio (calculating at square frame 315) of received EAI is more than or equal to T3 at square frame 330, so perform and relate to additionally comparing of EAI data reliability, thus determine the deployment of access request.For this reason, process and proceed at square frame 340, wherein consider the symbol with the EAI of maximum value (EAI_max).If EAI_max<0, so in square frame 345, AI detection logical one 65 is Negative Acknowledgement and EAI by statement AI is the deployment that access request is determined in positive acknowledgement.On the other hand, if EAI_max is more than or equal to 0, so in square frame 350, AI detection logical one 65 is Negative Acknowledgement and EAI by statement AI is the deployment that access request is determined in positive acknowledgement.Therefore, AI is set to Negative Acknowledgement and has nothing to do with EAI_max, but the symbol of EAI_max determines the setting of EAI.In some embodiments, Negative Acknowledgement can correspond to numerical value+1 corresponding to numerical value ﹣ 1 and positive acknowledgement.
In arbitrary situation, in square frame 355, AI detects logical one 65 and calculates E-DCH resource configuration index according to the information received on AICH220.Then, the process of Fig. 3 terminates.
Fig. 4 is the block diagram of the Wireless Telecom Equipment 155 according to different execution mode of the present disclosure.Wireless Telecom Equipment 155 comprises the RF transceiver 405, antenna 404, processor 410, memory 415 and the different miscellaneous parts that are included in shell (not shown).In this Example embodiments, AI detects logical one 65 and network stack 420 resides in memory 415, and adopts the form of the instruction performed by processor 410.
One or more layers of network stack 420, such as, physical layer, medium access control (MAC) layer and/or link layer process can be implemented in software and be performed by processor 410.Processor 410 also can perform speech coding and decoding and other different functions.Processor 410 may be embodied as baseband processor, digital signal processor (DSP), application processor, microcontroller, network processing unit or its combination.In some embodiments, processor 410, memory 415 and/or RF transceiver 405 can be on the same chip integrated.
Processor 410 can also carry out interaction from the parts in different other systems and Wireless Telecom Equipment 155, such as display 425, microphone 430, loud speaker 435, user input device 440, LED445 and the understandable miscellaneous part comprised in a mobile device.User input device 440 can comprise the capacitive touch screen be integrated in display 425, keypad, be integrated into other buttons in mobile wireless calculation element or switch or any other user input device understandable.
Wireless Telecom Equipment 155 can also comprise other power supplys that battery 450 maybe can supply power to the different parts of terminal.Wireless Telecom Equipment 155 can also comprise one or more Subscriber Identity Module (SIM) port 455, flash memory 460, SRAM465 or other system resource.Wireless Telecom Equipment 155 can also comprise one or more port 470, and it can comprise USB (USB) port and its distortion (such as micro USB, mini USB etc.), proprietary port, maybe can be provided for data manipulation and any other input/output end port of power supply that can promote rechargeable battery 450.
Any logic OR application (comprise AI and detect logical one 65) comprising software or code described herein can be embodied in any non-transience computer-readable medium, for being used by instruction execution system (such as processor 410) or the use of combined command executive system.In this sense, logic can comprise, and such as, comprises and can obtain from computer-readable medium and the statement (statement) of the instruction performed by processor 410 and statement (declaration).In context of the present disclosure, " computer-readable medium " can be can containing, store or maintain described herein used by instruction execution system or combined command executive system use logic OR application any medium.Computer-readable medium can comprise any one in many physical mediums, such as, and magnetizing mediums, optical medium or semiconductor medium.The example more specifically of suitable computer-readable medium will include but not limited to, tape, magnetic floppy disk, magnetic hard disk drives, storage card, solid-state drive, USB flash memory driver or CD.And computer-readable medium can be random-access memory (ram), comprise such as static RAM (SRAM) and dynamic random access memory (DRAM) or MAGNETIC RANDOM ACCESS MEMORY (MRAM).In addition, computer-readable medium can be the memory device of read-only memory (ROM), programmable read-only memory (prom), Erasable Programmable Read Only Memory EPROM (EPROM), Electrically Erasable Read Only Memory (EEPROM) or other types.
Although AI detects logical one 65 and other different parts described herein can be embodied in software, firmware or the code performed by processor as mentioned above, but as an alternative, can be embodied in equally in the combination of specialized hardware or software, common hardware and specialized hardware.If be embodied in specialized hardware, may be embodied as separately and use any one technology perhaps circuit of the combination of many technology or state machine.These technology can include but not limited to discrete logic, programmable logic device, application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA), SOC (system on a chip) (SoC), package system (SiP) or have any other hardware device of gate, wherein once apply one or more data-signal, gate just performs different logic functions.Those skilled in the art is these technology known usually, therefore, repeat no more herein.
Fig. 4 shows function and the operation that AI detects the enforcement of multiple parts of logical one 65.If embody in software, each square frame can representation module, program segment or comprise a part of code of the program command for performing concrete logic function.Program command can be embodied by the form of source code, and wherein source code package is containing the human-readable statements write with programming language or comprise by the machine code of the discernible digital command of suitable executive system of such as processor 410 in computer system or other system.Can to the machine code etc. be converted such as source code.If embodied within hardware, each square frame can represent the circuit perhaps many interconnection circuits for implementing concrete logic function.
Although Fig. 4 shows concrete execution sequence, should be appreciated that execution sequence can be different from described execution sequence.Such as, the execution sequence of two or more square frame can be upset relative to shown order.And two or more square frames illustrated continuously in Fig. 4 can side by side perform simultaneously or partly.Further, in some embodiments, can skip or omit the one or more square frames shown in Fig. 4.In addition, in order to improve effectiveness, calculating, performance measurement or assist trouble solution etc., any amount of counter, state variable, warning signal amount or message can be added logic flow described herein.Should be appreciated that Fig. 4 merely provides an example in the function distribution detecting the number of different types of the part operation of logical one 65 for implementing AI described herein.As an alternative, Fig. 4 can be considered as describing the step example detecting the method implemented in logical one 65 according to the AI of one or more execution mode.
It is emphasized that the above execution mode of the present disclosure is only used to the possible embodiment clearly understanding principle of the present disclosure elaboration.When not departing from spirit of the present disclosure and principle, many changes and improvements can be made to above-described execution mode.All these improve and change to be included in protection range of the present disclosure and to be protected by claims.